{"id":34339,"date":"2024-10-07T10:19:52","date_gmt":"2024-10-07T10:19:52","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/a-structured-risk-assessment-and-management-plan-conforming-to-an-appropriate-recognised-industry-standard-or-methodology-you-must-state-which-standard-or-methodology-you-have-applied-and-why-by-giv\/"},"modified":"2024-10-07T10:19:52","modified_gmt":"2024-10-07T10:19:52","slug":"a-structured-risk-assessment-and-management-plan-conforming-to-an-appropriate-recognised-industry-standard-or-methodology-you-must-state-which-standard-or-methodology-you-have-applied-and-why-by-giv","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/a-structured-risk-assessment-and-management-plan-conforming-to-an-appropriate-recognised-industry-standard-or-methodology-you-must-state-which-standard-or-methodology-you-have-applied-and-why-by-giv\/","title":{"rendered":"A structured risk assessment and management plan conforming to an appropriate recognised industry standard or methodology. You must state which standard or methodology you have applied and why, by giving examples of how you have applied it at each stage."},"content":{"rendered":"<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\">SUMMATIVE ASSESSMENT BRIEF<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"margin-left: 62.35pt; margin-right: 62.35pt; cursor: auto; color: inherit;\">\n<hr style=\"cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\">\n<table style=\"margin-left: 35.45pt; cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Author<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Duncan Greaves<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Assessment Type<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Summative assignment<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Weighting<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">100%<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Release<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Week 3<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Deadline<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0pt 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin-left: 5.65pt; margin-top: 1pt; margin-bottom: 1pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Monday following Week 8, 13:00 (UK time) *<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin-right: 18.95pt; margin-top: 6pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">* If this date falls on a UK public holiday or a University of York closure day, the submission date will change. Please check the submission point in the \u2018Assignments\u2019 area of the module in Canvas for the exact submission deadline.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<h1 style=\"cursor: auto;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">I.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\">Module Learning Outcomes<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\"><\/span><\/b><\/h1>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">The module learning outcomes for this module are as follows:<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 1.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Identify and analyse <\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">major threat types in a variety of systems.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 2.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Propose an appropriate high-level security management approach for a security-sensitive system in a defined regulatory environment.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 3.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Critically evaluate and apply a standard risk assessment approach\/tools to identify threats to a system.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 4.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Critically assess the relative merits of specific solution approaches for particular contexts.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 5.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Critically discuss leading edge research in cyber security and the challenges faced.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 106.35pt; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">MLO 6.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Critically evaluate the legal and ethical issues in cyber security.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">This assessment addresses <\/span><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">all<\/span><\/b><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">&nbsp;the module learning outcomes listed above.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<h1 style=\"cursor: auto;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">II.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\">Assessment Background\/Scenario<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 26pt; cursor: auto; color: inherit;\"><\/span><\/b><\/h1>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">The York Satellite Navigation Company (YSNC) is a fictional commercial satellite company who are planning to operate a number of Low Earth orbit (LEO) navigation satellites to provide an alternative to existing satellite services like the Global Positioning System (GPS) and the Global Navigation Satellite System (GNSS). The service being proposed by the company is \u201cProviding a reliable satellite navigation service\u201d. <\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">The required satellites have been successfully launched into orbit, and the company is preparing a Risk Management Plan prior to launching the new service. This involves assessing potential risks, threats, and weaknesses in the Ground Based systems, the Communications systems, and the Satellites. <\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-top: 12pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">You have been asked to produce a cyber security risk management plan for the service for the company board of directors, and to comment on any additional issues and technical areas relating to cyber security, which may need further consideration or research activity to allow the service to succeed and develop. <\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-top: 12pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">To do this, you will need to make assumptions about the business scenario or design in order to propose solutions; this is acceptable provided any such assumptions are realistic and clearly stated.<\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-top: 12pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">Assume that the Board members are already broadly familiar with the scenario and documents that have been cited here. However, you should state the details that are important to your arguments.<\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-top: 12pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">In assessing the potential service offering, you should pay particular attention to any security specifications, requirements and documentation relevant to the service being proposed. You are advised to consult additional external sources such as: <\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 90pt; margin-top: 12pt; margin-bottom: 0pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">The CCSDS \u201cSecurity Threats Against Space Missions\u201d document,<\/span><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">&nbsp;available from <\/span><\/b><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">(<\/span><span style=\"cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><u style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">https:\/\/public.ccsds.org\/Pubs\/350x1g3.pdf<\/span><\/u><\/a><\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">)<\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 90pt; margin-bottom: 0pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">The Cybersecurity Body of Knowledge (CYBOK)<\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 90pt; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">National or international standards and legislation to inform and support your work.<\/span><span style=\"font-size: 14pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin-left: 90pt; cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin-left: 90pt; cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin-left: 90pt; cursor: auto; color: inherit;\">instruction&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SUMMATIVE ASSESSMENT BRIEF Author Duncan Greaves Assessment Type Summative assignment Weighting 100% Release Week 3 Deadline Monday following Week 8, 13:00 (UK time) * * If this date falls on a UK public holiday or a University of York closure day, the submission date will change. Please check the submission point in the \u2018Assignments\u2019 area [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34339"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=34339"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34339\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=34339"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=34339"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=34339"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=34339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}